Abstract
Performance of data access is quite degraded in wireless mobile network due to limited resources and low bandwidth. Cache technique is one of widely used technique to improve performance of data search. But, it has vulnerability easily exposed to many attacks. In this paper, we propose a technique which prevents modification of cache data from malicious node and provides efficient cache. In the proposed technique, member key is used in order to prevent malicious nodes from joining in network. Cluster head is elected based on reliability value and the number of connection after MANET is divided into clusters. It evaluates reliability of MN based on received reliability value from neighbor nodes and issues member key. MNs request cache using member key and transmit data. Cluster head manages two tables to provide efficient cache. Transmission delay and overhead is reduced by doing so. We confirmed superior performance of the proposed technique through the experiment results.
Similar content being viewed by others
References
Frodigh, M., Johansson, P., & Larsson, L. (2000). Wireless ad hoc networking. Erricsson Review, 4.
Kucuk, K., & Kavak, A. (2013). Connectivity analysis for wireless sensor networks with antenna array integrated central node. Wireless Personal Communications, 1–11.
Lee, S., Su, W., & Gerla, M. (2002). On-demand multicast routing protocol in multihop wireless mobile networks. ACM/Kluwer Mobile Networks and Application (MONET), 6, 441–453.
Bsoul, M., Al-Khasawneh, A., Abdallah, A. E., Abdallah, E. E., & Obeidat, I. (2013). An energy-efficient threshold-based clustering protocol for wireless sensor networks. Wireless Personal Communications, 70(1), 99–112.
Du, Y., & Gupta, S. (2009). Improving on-demand data access efficiency in MANET with cooperative caching. In Ad Hoc Networks Elsevier, pp. 579–598.
Lim, S., Lee, W. C., Cao, G., & Das, C. R. (2004). Performance comparison of cache invalidation strategies for internet based mobile Ad hoc networks. In Proceedings of IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 104–204.
Lim, S., Lee, W. C., Cao, G., & Das, C. R. (2006). A novel caching scheme for improving internet based mobile ad hoc networks performance. Elsevier Journal of Ad Hoc Networks, 2, 225–239.
Hong, L., Zhou, G., Liu, B., & Son, S. (2013). Continuous location dependent queries in mobile wireless sensor networks. Wireless Personal Communications, 68(1), 153–173.
Chand, N., & Joshi, R. C. (2011). A cooperative caching strategy in mobile ad hoc networks based on clusters. International Journal of Mobile Computing and Multimedia Communications, 3, 20–35.
Huang, Y., Cao, J., Jin, B., Tao, X., & Lu, J. (2010). Flexible cache consistency maintenance over wireless ad hoc network. IEEE Transaction on Parallel and Distributed Systems, 12, 1150–1161.
Mishra, A. K., & Turuk, A. K. (2013). A zone-based node replica detection scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 601–621.
Xu, J., Tang, X., & Lee, D. (2003). Performance analysis of location-dependent cache invalidation schemes for mobile environments. IEEE Transaction on Knowledge and Data Engineering, 15, 474–488.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yoo, SJ., Lee, DH. & Yang, HS. A Novel Secure Scheme For Wireless Ad Hoc Network. Wireless Pers Commun 73, 197–205 (2013). https://doi.org/10.1007/s11277-013-1230-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-013-1230-9